CloudSploit

Connecting an AWS account to CloudSploit

Modified on: Sat, 1 Oct, 2016 at 5:43 PM

Before CloudSploit can produce any security scan results, you must connect an Amazon Web Services account. This done through the use of a secure, third-party cross-account IAM role. To fully connect the account, you must complete steps in both your AWS account, as well as in your CloudSploit account.

Obtain an External ID from CloudSploit

Log into CloudSploit and navigate to the "AWS Accounts" page.

At the bottom, under "Add a New AWS Account" copy the External ID (note: this is automatically generated; refreshing the page will generate a new ID).

Save this ID for the next steps. Do not close or refresh the page.

Create an IAM Role for CloudSploit

Option 1: Use our CloudFormation Template (Recommended)

Click to open CloudFormation in your account.

Enter the external ID copied in the steps above as the input parameter.

Launch the stack and wait for it to complete.

Copy the role ARN from the "Outputs" tab for the next steps.

Option 2: Manually Create a Role

Log into your AWS account with permissions to create a new IAM role.

Navigate to the IAM console.

Create a new IAM role.

Select "Role for Third-Party Cross-Account Access".

Enter "057012691312" for the account to trust.

Enter the external ID copied in the steps above.

Ensure that MFA token is not selected.

Select the "SecurityAudit" managed policy.

Create the role and copy the role ARN.

Save this ARN for the next steps.

Add the Role to CloudSploit

Back in the CloudSploit console, on the AWS Accounts page, paste the role ARN into the form.

Enter a descriptive name for your account, such as "Megacorp-dev".

If you are on a Plus or Premium plan and have added groups to your account, optionally select a group.